1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (c) 2002 Poul-Henning Kamp 5 * Copyright (c) 2002 Networks Associates Technology, Inc. 6 * All rights reserved. 7 * 8 * This software was developed for the FreeBSD Project by Poul-Henning Kamp 9 * and NAI Labs, the Security Research Division of Network Associates, Inc. 10 * under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the 11 * DARPA CHATS research program. 12 * 13 * Redistribution and use in source and binary forms, with or without 14 * modification, are permitted provided that the following conditions 15 * are met: 16 * 1. Redistributions of source code must retain the above copyright 17 * notice, this list of conditions and the following disclaimer. 18 * 2. Redistributions in binary form must reproduce the above copyright 19 * notice, this list of conditions and the following disclaimer in the 20 * documentation and/or other materials provided with the distribution. 21 * 3. The names of the authors may not be used to endorse or promote 22 * products derived from this software without specific prior written 23 * permission. 24 * 25 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 28 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 35 * SUCH DAMAGE. 36 * 37 * Copyright (c) 1986, 1992, 1993 38 * The Regents of the University of California. All rights reserved. 39 * 40 * Redistribution and use in source and binary forms, with or without 41 * modification, are permitted provided that the following conditions 42 * are met: 43 * 1. Redistributions of source code must retain the above copyright 44 * notice, this list of conditions and the following disclaimer. 45 * 2. Redistributions in binary form must reproduce the above copyright 46 * notice, this list of conditions and the following disclaimer in the 47 * documentation and/or other materials provided with the distribution. 48 * 3. Neither the name of the University nor the names of its contributors 49 * may be used to endorse or promote products derived from this software 50 * without specific prior written permission. 51 * 52 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 53 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 54 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 55 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 56 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 57 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 58 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 59 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 60 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 61 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 62 * SUCH DAMAGE. 63 */ 64 65 #include <sys/cdefs.h> 66 __FBSDID("$FreeBSD$"); 67 68 #include <sys/param.h> 69 #include <sys/disk.h> 70 #include <sys/kerneldump.h> 71 #include <sys/mount.h> 72 #include <sys/stat.h> 73 74 #include <capsicum_helpers.h> 75 #include <ctype.h> 76 #include <errno.h> 77 #include <fcntl.h> 78 #include <fstab.h> 79 #include <paths.h> 80 #include <signal.h> 81 #include <stdarg.h> 82 #include <stdbool.h> 83 #include <stdio.h> 84 #include <stdlib.h> 85 #include <string.h> 86 #include <syslog.h> 87 #include <time.h> 88 #include <unistd.h> 89 #define Z_SOLO 90 #include <zlib.h> 91 #include <zstd.h> 92 93 #include <libcasper.h> 94 #include <casper/cap_fileargs.h> 95 #include <casper/cap_syslog.h> 96 97 #include <libxo/xo.h> 98 99 /* The size of the buffer used for I/O. */ 100 #define BUFFERSIZE (1024*1024) 101 102 #define STATUS_BAD 0 103 #define STATUS_GOOD 1 104 #define STATUS_UNKNOWN 2 105 106 static cap_channel_t *capsyslog; 107 static fileargs_t *capfa; 108 static bool checkfor, compress, uncompress, clear, force, keep; /* flags */ 109 static int verbose; 110 static int nfound, nsaved, nerr; /* statistics */ 111 static int maxdumps; 112 113 extern FILE *zdopen(int, const char *); 114 115 static sig_atomic_t got_siginfo; 116 static void infohandler(int); 117 118 static void 119 logmsg(int pri, const char *fmt, ...) 120 { 121 va_list ap; 122 123 va_start(ap, fmt); 124 if (capsyslog != NULL) 125 cap_vsyslog(capsyslog, pri, fmt, ap); 126 else 127 vsyslog(pri, fmt, ap); 128 va_end(ap); 129 } 130 131 static FILE * 132 xfopenat(int dirfd, const char *path, int flags, const char *modestr, ...) 133 { 134 va_list ap; 135 FILE *fp; 136 mode_t mode; 137 int error, fd; 138 139 if ((flags & O_CREAT) == O_CREAT) { 140 va_start(ap, modestr); 141 mode = (mode_t)va_arg(ap, int); 142 va_end(ap); 143 } else 144 mode = 0; 145 146 fd = openat(dirfd, path, flags, mode); 147 if (fd < 0) 148 return (NULL); 149 fp = fdopen(fd, modestr); 150 if (fp == NULL) { 151 error = errno; 152 (void)close(fd); 153 errno = error; 154 } 155 return (fp); 156 } 157 158 static void 159 printheader(xo_handle_t *xo, const struct kerneldumpheader *h, 160 const char *device, int bounds, const int status) 161 { 162 uint64_t dumplen; 163 time_t t; 164 struct tm tm; 165 char time_str[64]; 166 const char *stat_str; 167 const char *comp_str; 168 169 xo_flush_h(xo); 170 xo_emit_h(xo, "{Lwc:Dump header from device}{:dump_device/%s}\n", 171 device); 172 xo_emit_h(xo, "{P: }{Lwc:Architecture}{:architecture/%s}\n", 173 h->architecture); 174 xo_emit_h(xo, 175 "{P: }{Lwc:Architecture Version}{:architecture_version/%u}\n", 176 dtoh32(h->architectureversion)); 177 dumplen = dtoh64(h->dumplength); 178 xo_emit_h(xo, "{P: }{Lwc:Dump Length}{:dump_length_bytes/%lld}\n", 179 (long long)dumplen); 180 xo_emit_h(xo, "{P: }{Lwc:Blocksize}{:blocksize/%d}\n", 181 dtoh32(h->blocksize)); 182 switch (h->compression) { 183 case KERNELDUMP_COMP_NONE: 184 comp_str = "none"; 185 break; 186 case KERNELDUMP_COMP_GZIP: 187 comp_str = "gzip"; 188 break; 189 case KERNELDUMP_COMP_ZSTD: 190 comp_str = "zstd"; 191 break; 192 default: 193 comp_str = "???"; 194 break; 195 } 196 xo_emit_h(xo, "{P: }{Lwc:Compression}{:compression/%s}\n", comp_str); 197 t = dtoh64(h->dumptime); 198 localtime_r(&t, &tm); 199 if (strftime(time_str, sizeof(time_str), "%F %T %z", &tm) == 0) 200 time_str[0] = '\0'; 201 xo_emit_h(xo, "{P: }{Lwc:Dumptime}{:dumptime/%s}\n", time_str); 202 xo_emit_h(xo, "{P: }{Lwc:Hostname}{:hostname/%s}\n", h->hostname); 203 xo_emit_h(xo, "{P: }{Lwc:Magic}{:magic/%s}\n", h->magic); 204 xo_emit_h(xo, "{P: }{Lwc:Version String}{:version_string/%s}", 205 h->versionstring); 206 xo_emit_h(xo, "{P: }{Lwc:Panic String}{:panic_string/%s}\n", 207 h->panicstring); 208 xo_emit_h(xo, "{P: }{Lwc:Dump Parity}{:dump_parity/%u}\n", h->parity); 209 xo_emit_h(xo, "{P: }{Lwc:Bounds}{:bounds/%d}\n", bounds); 210 211 switch (status) { 212 case STATUS_BAD: 213 stat_str = "bad"; 214 break; 215 case STATUS_GOOD: 216 stat_str = "good"; 217 break; 218 default: 219 stat_str = "unknown"; 220 break; 221 } 222 xo_emit_h(xo, "{P: }{Lwc:Dump Status}{:dump_status/%s}\n", stat_str); 223 xo_flush_h(xo); 224 } 225 226 static int 227 getbounds(int savedirfd) 228 { 229 FILE *fp; 230 char buf[6]; 231 int ret; 232 233 /* 234 * If we are just checking, then we haven't done a chdir to the dump 235 * directory and we should not try to read a bounds file. 236 */ 237 if (checkfor) 238 return (0); 239 240 ret = 0; 241 242 if ((fp = xfopenat(savedirfd, "bounds", O_RDONLY, "r")) == NULL) { 243 if (verbose) 244 printf("unable to open bounds file, using 0\n"); 245 return (ret); 246 } 247 if (fgets(buf, sizeof(buf), fp) == NULL) { 248 if (feof(fp)) 249 logmsg(LOG_WARNING, "bounds file is empty, using 0"); 250 else 251 logmsg(LOG_WARNING, "bounds file: %s", strerror(errno)); 252 fclose(fp); 253 return (ret); 254 } 255 256 errno = 0; 257 ret = (int)strtol(buf, NULL, 10); 258 if (ret == 0 && (errno == EINVAL || errno == ERANGE)) 259 logmsg(LOG_WARNING, "invalid value found in bounds, using 0"); 260 fclose(fp); 261 return (ret); 262 } 263 264 static void 265 writebounds(int savedirfd, int bounds) 266 { 267 FILE *fp; 268 269 if ((fp = xfopenat(savedirfd, "bounds", O_WRONLY | O_CREAT | O_TRUNC, 270 "w", 0644)) == NULL) { 271 logmsg(LOG_WARNING, "unable to write to bounds file: %m"); 272 return; 273 } 274 275 if (verbose) 276 printf("bounds number: %d\n", bounds); 277 278 fprintf(fp, "%d\n", bounds); 279 fclose(fp); 280 } 281 282 static bool 283 writekey(int savedirfd, const char *keyname, uint8_t *dumpkey, 284 uint32_t dumpkeysize) 285 { 286 int fd; 287 288 fd = openat(savedirfd, keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600); 289 if (fd == -1) { 290 logmsg(LOG_ERR, "Unable to open %s to write the key: %m.", 291 keyname); 292 return (false); 293 } 294 295 if (write(fd, dumpkey, dumpkeysize) != (ssize_t)dumpkeysize) { 296 logmsg(LOG_ERR, "Unable to write the key to %s: %m.", keyname); 297 close(fd); 298 return (false); 299 } 300 301 close(fd); 302 return (true); 303 } 304 305 static off_t 306 file_size(int savedirfd, const char *path) 307 { 308 struct stat sb; 309 310 /* Ignore all errors, this file may not exist. */ 311 if (fstatat(savedirfd, path, &sb, 0) == -1) 312 return (0); 313 return (sb.st_size); 314 } 315 316 static off_t 317 saved_dump_size(int savedirfd, int bounds) 318 { 319 static char path[PATH_MAX]; 320 off_t dumpsize; 321 322 dumpsize = 0; 323 324 (void)snprintf(path, sizeof(path), "info.%d", bounds); 325 dumpsize += file_size(savedirfd, path); 326 (void)snprintf(path, sizeof(path), "vmcore.%d", bounds); 327 dumpsize += file_size(savedirfd, path); 328 (void)snprintf(path, sizeof(path), "vmcore.%d.gz", bounds); 329 dumpsize += file_size(savedirfd, path); 330 (void)snprintf(path, sizeof(path), "vmcore.%d.zst", bounds); 331 dumpsize += file_size(savedirfd, path); 332 (void)snprintf(path, sizeof(path), "textdump.tar.%d", bounds); 333 dumpsize += file_size(savedirfd, path); 334 (void)snprintf(path, sizeof(path), "textdump.tar.%d.gz", bounds); 335 dumpsize += file_size(savedirfd, path); 336 337 return (dumpsize); 338 } 339 340 static void 341 saved_dump_remove(int savedirfd, int bounds) 342 { 343 static char path[PATH_MAX]; 344 345 (void)snprintf(path, sizeof(path), "info.%d", bounds); 346 (void)unlinkat(savedirfd, path, 0); 347 (void)snprintf(path, sizeof(path), "vmcore.%d", bounds); 348 (void)unlinkat(savedirfd, path, 0); 349 (void)snprintf(path, sizeof(path), "vmcore.%d.gz", bounds); 350 (void)unlinkat(savedirfd, path, 0); 351 (void)snprintf(path, sizeof(path), "vmcore.%d.zst", bounds); 352 (void)unlinkat(savedirfd, path, 0); 353 (void)snprintf(path, sizeof(path), "textdump.tar.%d", bounds); 354 (void)unlinkat(savedirfd, path, 0); 355 (void)snprintf(path, sizeof(path), "textdump.tar.%d.gz", bounds); 356 (void)unlinkat(savedirfd, path, 0); 357 } 358 359 static void 360 symlinks_remove(int savedirfd) 361 { 362 363 (void)unlinkat(savedirfd, "info.last", 0); 364 (void)unlinkat(savedirfd, "key.last", 0); 365 (void)unlinkat(savedirfd, "vmcore.last", 0); 366 (void)unlinkat(savedirfd, "vmcore.last.gz", 0); 367 (void)unlinkat(savedirfd, "vmcore.last.zst", 0); 368 (void)unlinkat(savedirfd, "vmcore_encrypted.last", 0); 369 (void)unlinkat(savedirfd, "vmcore_encrypted.last.gz", 0); 370 (void)unlinkat(savedirfd, "textdump.tar.last", 0); 371 (void)unlinkat(savedirfd, "textdump.tar.last.gz", 0); 372 } 373 374 /* 375 * Check that sufficient space is available on the disk that holds the 376 * save directory. 377 */ 378 static int 379 check_space(const char *savedir, int savedirfd, off_t dumpsize, int bounds) 380 { 381 char buf[100]; 382 struct statfs fsbuf; 383 FILE *fp; 384 off_t available, minfree, spacefree, totfree, needed; 385 386 if (fstatfs(savedirfd, &fsbuf) < 0) { 387 logmsg(LOG_ERR, "%s: %m", savedir); 388 exit(1); 389 } 390 spacefree = ((off_t) fsbuf.f_bavail * fsbuf.f_bsize) / 1024; 391 totfree = ((off_t) fsbuf.f_bfree * fsbuf.f_bsize) / 1024; 392 393 if ((fp = xfopenat(savedirfd, "minfree", O_RDONLY, "r")) == NULL) 394 minfree = 0; 395 else { 396 if (fgets(buf, sizeof(buf), fp) == NULL) 397 minfree = 0; 398 else { 399 char *endp; 400 401 errno = 0; 402 minfree = strtoll(buf, &endp, 10); 403 if (minfree == 0 && errno != 0) 404 minfree = -1; 405 else { 406 while (*endp != '\0' && isspace(*endp)) 407 endp++; 408 if (*endp != '\0' || minfree < 0) 409 minfree = -1; 410 } 411 if (minfree < 0) 412 logmsg(LOG_WARNING, 413 "`minfree` didn't contain a valid size " 414 "(`%s`). Defaulting to 0", buf); 415 } 416 (void)fclose(fp); 417 } 418 419 available = minfree > 0 ? spacefree - minfree : totfree; 420 needed = dumpsize / 1024 + 2; /* 2 for info file */ 421 needed -= saved_dump_size(savedirfd, bounds); 422 if (available < needed) { 423 logmsg(LOG_WARNING, 424 "no dump: not enough free space on device (need at least " 425 "%jdkB for dump; %jdkB available; %jdkB reserved)", 426 (intmax_t)needed, 427 (intmax_t)available + minfree, 428 (intmax_t)minfree); 429 return (0); 430 } 431 if (spacefree - needed < 0) 432 logmsg(LOG_WARNING, 433 "dump performed, but free space threshold crossed"); 434 return (1); 435 } 436 437 static bool 438 compare_magic(const struct kerneldumpheader *kdh, const char *magic) 439 { 440 441 return (strncmp(kdh->magic, magic, sizeof(kdh->magic)) == 0); 442 } 443 444 #define BLOCKSIZE (1<<12) 445 #define BLOCKMASK (~(BLOCKSIZE-1)) 446 447 static size_t 448 sparsefwrite(const char *buf, size_t nr, FILE *fp) 449 { 450 size_t nw, he, hs; 451 452 for (nw = 0; nw < nr; nw = he) { 453 /* find a contiguous block of zeroes */ 454 for (hs = nw; hs < nr; hs += BLOCKSIZE) { 455 for (he = hs; he < nr && buf[he] == 0; ++he) 456 /* nothing */ ; 457 /* is the hole long enough to matter? */ 458 if (he >= hs + BLOCKSIZE) 459 break; 460 } 461 462 /* back down to a block boundary */ 463 he &= BLOCKMASK; 464 465 /* 466 * 1) Don't go beyond the end of the buffer. 467 * 2) If the end of the buffer is less than 468 * BLOCKSIZE bytes away, we're at the end 469 * of the file, so just grab what's left. 470 */ 471 if (hs + BLOCKSIZE > nr) 472 hs = he = nr; 473 474 /* 475 * At this point, we have a partial ordering: 476 * nw <= hs <= he <= nr 477 * If hs > nw, buf[nw..hs] contains non-zero 478 * data. If he > hs, buf[hs..he] is all zeroes. 479 */ 480 if (hs > nw) 481 if (fwrite(buf + nw, hs - nw, 1, fp) != 1) 482 break; 483 if (he > hs) 484 if (fseeko(fp, he - hs, SEEK_CUR) == -1) 485 break; 486 } 487 488 return (nw); 489 } 490 491 static char *zbuf; 492 static size_t zbufsize; 493 494 static ssize_t 495 GunzipWrite(z_stream *z, char *in, size_t insize, FILE *fp) 496 { 497 static bool firstblock = true; /* XXX not re-entrable/usable */ 498 const size_t hdrlen = 10; 499 size_t nw = 0, w; 500 int rv; 501 502 z->next_in = in; 503 z->avail_in = insize; 504 /* 505 * Since contrib/zlib for some reason is compiled 506 * without GUNZIP define, we need to skip the gzip 507 * header manually. Kernel puts minimal 10 byte 508 * header, see sys/kern/subr_compressor.c:gz_reset(). 509 */ 510 if (firstblock) { 511 z->next_in += hdrlen; 512 z->avail_in -= hdrlen; 513 firstblock = false; 514 } 515 do { 516 z->next_out = zbuf; 517 z->avail_out = zbufsize; 518 rv = inflate(z, Z_NO_FLUSH); 519 if (rv != Z_OK && rv != Z_STREAM_END) { 520 logmsg(LOG_ERR, "decompression failed: %s", z->msg); 521 return (-1); 522 } 523 w = sparsefwrite(zbuf, zbufsize - z->avail_out, fp); 524 if (w < zbufsize - z->avail_out) 525 return (-1); 526 nw += w; 527 } while (z->avail_in > 0 && rv != Z_STREAM_END); 528 529 return (nw); 530 } 531 532 static ssize_t 533 ZstdWrite(ZSTD_DCtx *Zctx, char *in, size_t insize, FILE *fp) 534 { 535 ZSTD_inBuffer Zin; 536 ZSTD_outBuffer Zout; 537 size_t nw = 0, w; 538 int rv; 539 540 Zin.src = in; 541 Zin.size = insize; 542 Zin.pos = 0; 543 do { 544 Zout.dst = zbuf; 545 Zout.size = zbufsize; 546 Zout.pos = 0; 547 rv = ZSTD_decompressStream(Zctx, &Zout, &Zin); 548 if (ZSTD_isError(rv)) { 549 logmsg(LOG_ERR, "decompression failed: %s", 550 ZSTD_getErrorName(rv)); 551 return (-1); 552 } 553 w = sparsefwrite(zbuf, Zout.pos, fp); 554 if (w < Zout.pos) 555 return (-1); 556 nw += w; 557 } while (Zin.pos < Zin.size && rv != 0); 558 559 return (nw); 560 } 561 562 static int 563 DoRegularFile(int fd, off_t dumpsize, u_int sectorsize, bool sparse, 564 uint8_t compression, char *buf, const char *device, 565 const char *filename, FILE *fp) 566 { 567 size_t nr, wl; 568 ssize_t nw; 569 off_t dmpcnt, origsize; 570 z_stream z; /* gzip */ 571 ZSTD_DCtx *Zctx; /* zstd */ 572 573 dmpcnt = 0; 574 origsize = dumpsize; 575 if (compression == KERNELDUMP_COMP_GZIP) { 576 memset(&z, 0, sizeof(z)); 577 z.zalloc = Z_NULL; 578 z.zfree = Z_NULL; 579 if (inflateInit2(&z, -MAX_WBITS) != Z_OK) { 580 logmsg(LOG_ERR, "failed to initialize zlib: %s", z.msg); 581 return (-1); 582 } 583 zbufsize = BUFFERSIZE; 584 } else if (compression == KERNELDUMP_COMP_ZSTD) { 585 if ((Zctx = ZSTD_createDCtx()) == NULL) { 586 logmsg(LOG_ERR, "failed to initialize zstd"); 587 return (-1); 588 } 589 zbufsize = ZSTD_DStreamOutSize(); 590 } 591 if (zbufsize > 0) 592 if ((zbuf = malloc(zbufsize)) == NULL) { 593 logmsg(LOG_ERR, "failed to alloc decompression buffer"); 594 return (-1); 595 } 596 597 while (dumpsize > 0) { 598 wl = BUFFERSIZE; 599 if (wl > (size_t)dumpsize) 600 wl = dumpsize; 601 nr = read(fd, buf, roundup(wl, sectorsize)); 602 if (nr != roundup(wl, sectorsize)) { 603 if (nr == 0) 604 logmsg(LOG_WARNING, 605 "WARNING: EOF on dump device"); 606 else 607 logmsg(LOG_ERR, "read error on %s: %m", device); 608 nerr++; 609 return (-1); 610 } 611 if (compression == KERNELDUMP_COMP_GZIP) 612 nw = GunzipWrite(&z, buf, nr, fp); 613 else if (compression == KERNELDUMP_COMP_ZSTD) 614 nw = ZstdWrite(Zctx, buf, nr, fp); 615 else if (!sparse) 616 nw = fwrite(buf, 1, wl, fp); 617 else 618 nw = sparsefwrite(buf, wl, fp); 619 if (nw < 0 || (compression == KERNELDUMP_COMP_NONE && 620 (size_t)nw != wl)) { 621 logmsg(LOG_ERR, 622 "write error on %s file: %m", filename); 623 logmsg(LOG_WARNING, 624 "WARNING: vmcore may be incomplete"); 625 nerr++; 626 return (-1); 627 } 628 if (verbose) { 629 dmpcnt += wl; 630 printf("%llu\r", (unsigned long long)dmpcnt); 631 fflush(stdout); 632 } 633 dumpsize -= wl; 634 if (got_siginfo) { 635 printf("%s %.1lf%%\n", filename, (100.0 - (100.0 * 636 (double)dumpsize / (double)origsize))); 637 got_siginfo = 0; 638 } 639 } 640 return (0); 641 } 642 643 /* 644 * Specialized version of dump-reading logic for use with textdumps, which 645 * are written backwards from the end of the partition, and must be reversed 646 * before being written to the file. Textdumps are small, so do a bit less 647 * work to optimize/sparsify. 648 */ 649 static int 650 DoTextdumpFile(int fd, off_t dumpsize, off_t lasthd, char *buf, 651 const char *device, const char *filename, FILE *fp) 652 { 653 int nr, nw, wl; 654 off_t dmpcnt, totsize; 655 656 totsize = dumpsize; 657 dmpcnt = 0; 658 wl = 512; 659 if ((dumpsize % wl) != 0) { 660 logmsg(LOG_ERR, "textdump uneven multiple of 512 on %s", 661 device); 662 nerr++; 663 return (-1); 664 } 665 while (dumpsize > 0) { 666 nr = pread(fd, buf, wl, lasthd - (totsize - dumpsize) - wl); 667 if (nr != wl) { 668 if (nr == 0) 669 logmsg(LOG_WARNING, 670 "WARNING: EOF on dump device"); 671 else 672 logmsg(LOG_ERR, "read error on %s: %m", device); 673 nerr++; 674 return (-1); 675 } 676 nw = fwrite(buf, 1, wl, fp); 677 if (nw != wl) { 678 logmsg(LOG_ERR, 679 "write error on %s file: %m", filename); 680 logmsg(LOG_WARNING, 681 "WARNING: textdump may be incomplete"); 682 nerr++; 683 return (-1); 684 } 685 if (verbose) { 686 dmpcnt += wl; 687 printf("%llu\r", (unsigned long long)dmpcnt); 688 fflush(stdout); 689 } 690 dumpsize -= wl; 691 } 692 return (0); 693 } 694 695 static void 696 DoFile(const char *savedir, int savedirfd, const char *device) 697 { 698 xo_handle_t *xostdout, *xoinfo; 699 static char infoname[PATH_MAX], corename[PATH_MAX], linkname[PATH_MAX]; 700 static char keyname[PATH_MAX]; 701 static char *buf = NULL; 702 char *temp = NULL; 703 struct kerneldumpheader kdhf, kdhl; 704 uint8_t *dumpkey; 705 off_t mediasize, dumpextent, dumplength, firsthd, lasthd; 706 FILE *core, *info; 707 int fdcore, fddev, error; 708 int bounds, status; 709 u_int sectorsize, xostyle; 710 uint32_t dumpkeysize; 711 bool iscompressed, isencrypted, istextdump, ret; 712 713 bounds = getbounds(savedirfd); 714 dumpkey = NULL; 715 mediasize = 0; 716 status = STATUS_UNKNOWN; 717 718 xostdout = xo_create_to_file(stdout, XO_STYLE_TEXT, 0); 719 if (xostdout == NULL) { 720 logmsg(LOG_ERR, "%s: %m", infoname); 721 return; 722 } 723 724 if (maxdumps > 0 && bounds == maxdumps) 725 bounds = 0; 726 727 if (buf == NULL) { 728 buf = malloc(BUFFERSIZE); 729 if (buf == NULL) { 730 logmsg(LOG_ERR, "%m"); 731 return; 732 } 733 } 734 735 if (verbose) 736 printf("checking for kernel dump on device %s\n", device); 737 738 fddev = fileargs_open(capfa, device); 739 if (fddev < 0) { 740 logmsg(LOG_ERR, "%s: %m", device); 741 return; 742 } 743 744 error = ioctl(fddev, DIOCGMEDIASIZE, &mediasize); 745 if (!error) 746 error = ioctl(fddev, DIOCGSECTORSIZE, §orsize); 747 if (error) { 748 logmsg(LOG_ERR, 749 "couldn't find media and/or sector size of %s: %m", device); 750 goto closefd; 751 } 752 753 if (verbose) { 754 printf("mediasize = %lld bytes\n", (long long)mediasize); 755 printf("sectorsize = %u bytes\n", sectorsize); 756 } 757 758 if (sectorsize < sizeof(kdhl)) { 759 logmsg(LOG_ERR, 760 "Sector size is less the kernel dump header %zu", 761 sizeof(kdhl)); 762 goto closefd; 763 } 764 765 lasthd = mediasize - sectorsize; 766 temp = malloc(sectorsize); 767 if (temp == NULL) { 768 logmsg(LOG_ERR, "%m"); 769 goto closefd; 770 } 771 if (lseek(fddev, lasthd, SEEK_SET) != lasthd || 772 read(fddev, temp, sectorsize) != (ssize_t)sectorsize) { 773 logmsg(LOG_ERR, 774 "error reading last dump header at offset %lld in %s: %m", 775 (long long)lasthd, device); 776 goto closefd; 777 } 778 memcpy(&kdhl, temp, sizeof(kdhl)); 779 iscompressed = istextdump = false; 780 if (compare_magic(&kdhl, TEXTDUMPMAGIC)) { 781 if (verbose) 782 printf("textdump magic on last dump header on %s\n", 783 device); 784 istextdump = true; 785 if (dtoh32(kdhl.version) != KERNELDUMP_TEXT_VERSION) { 786 logmsg(LOG_ERR, 787 "unknown version (%d) in last dump header on %s", 788 dtoh32(kdhl.version), device); 789 790 status = STATUS_BAD; 791 if (!force) 792 goto closefd; 793 } 794 } else if (compare_magic(&kdhl, KERNELDUMPMAGIC)) { 795 if (dtoh32(kdhl.version) != KERNELDUMPVERSION) { 796 logmsg(LOG_ERR, 797 "unknown version (%d) in last dump header on %s", 798 dtoh32(kdhl.version), device); 799 800 status = STATUS_BAD; 801 if (!force) 802 goto closefd; 803 } 804 switch (kdhl.compression) { 805 case KERNELDUMP_COMP_NONE: 806 uncompress = false; 807 break; 808 case KERNELDUMP_COMP_GZIP: 809 case KERNELDUMP_COMP_ZSTD: 810 if (compress && verbose) 811 printf("dump is already compressed\n"); 812 if (uncompress && verbose) 813 printf("dump to be uncompressed\n"); 814 compress = false; 815 iscompressed = true; 816 break; 817 default: 818 logmsg(LOG_ERR, "unknown compression type %d on %s", 819 kdhl.compression, device); 820 break; 821 } 822 } else { 823 if (verbose) 824 printf("magic mismatch on last dump header on %s\n", 825 device); 826 827 status = STATUS_BAD; 828 if (!force) 829 goto closefd; 830 831 if (compare_magic(&kdhl, KERNELDUMPMAGIC_CLEARED)) { 832 if (verbose) 833 printf("forcing magic on %s\n", device); 834 memcpy(kdhl.magic, KERNELDUMPMAGIC, sizeof(kdhl.magic)); 835 } else { 836 logmsg(LOG_ERR, "unable to force dump - bad magic"); 837 goto closefd; 838 } 839 if (dtoh32(kdhl.version) != KERNELDUMPVERSION) { 840 logmsg(LOG_ERR, 841 "unknown version (%d) in last dump header on %s", 842 dtoh32(kdhl.version), device); 843 844 status = STATUS_BAD; 845 if (!force) 846 goto closefd; 847 } 848 } 849 850 nfound++; 851 if (clear) 852 goto nuke; 853 854 if (kerneldump_parity(&kdhl)) { 855 logmsg(LOG_ERR, 856 "parity error on last dump header on %s", device); 857 nerr++; 858 status = STATUS_BAD; 859 if (!force) 860 goto closefd; 861 } 862 dumpextent = dtoh64(kdhl.dumpextent); 863 dumplength = dtoh64(kdhl.dumplength); 864 dumpkeysize = dtoh32(kdhl.dumpkeysize); 865 firsthd = lasthd - dumpextent - sectorsize - dumpkeysize; 866 if (lseek(fddev, firsthd, SEEK_SET) != firsthd || 867 read(fddev, temp, sectorsize) != (ssize_t)sectorsize) { 868 logmsg(LOG_ERR, 869 "error reading first dump header at offset %lld in %s: %m", 870 (long long)firsthd, device); 871 nerr++; 872 goto closefd; 873 } 874 memcpy(&kdhf, temp, sizeof(kdhf)); 875 876 if (verbose >= 2) { 877 printf("First dump headers:\n"); 878 printheader(xostdout, &kdhf, device, bounds, -1); 879 880 printf("\nLast dump headers:\n"); 881 printheader(xostdout, &kdhl, device, bounds, -1); 882 printf("\n"); 883 } 884 885 if (memcmp(&kdhl, &kdhf, sizeof(kdhl))) { 886 logmsg(LOG_ERR, 887 "first and last dump headers disagree on %s", device); 888 nerr++; 889 status = STATUS_BAD; 890 if (!force) 891 goto closefd; 892 } else { 893 status = STATUS_GOOD; 894 } 895 896 if (checkfor) { 897 printf("A dump exists on %s\n", device); 898 close(fddev); 899 exit(0); 900 } 901 902 if (kdhl.panicstring[0] != '\0') 903 logmsg(LOG_ALERT, "reboot after panic: %.*s", 904 (int)sizeof(kdhl.panicstring), kdhl.panicstring); 905 else 906 logmsg(LOG_ALERT, "reboot"); 907 908 if (verbose) 909 printf("Checking for available free space\n"); 910 911 if (!check_space(savedir, savedirfd, dumplength, bounds)) { 912 nerr++; 913 goto closefd; 914 } 915 916 writebounds(savedirfd, bounds + 1); 917 918 saved_dump_remove(savedirfd, bounds); 919 920 snprintf(infoname, sizeof(infoname), "info.%d", bounds); 921 922 /* 923 * Create or overwrite any existing dump header files. 924 */ 925 if ((info = xfopenat(savedirfd, infoname, 926 O_WRONLY | O_CREAT | O_TRUNC, "w", 0600)) == NULL) { 927 logmsg(LOG_ERR, "open(%s): %m", infoname); 928 nerr++; 929 goto closefd; 930 } 931 932 isencrypted = (dumpkeysize > 0); 933 if (compress) 934 snprintf(corename, sizeof(corename), "%s.%d.gz", 935 istextdump ? "textdump.tar" : 936 (isencrypted ? "vmcore_encrypted" : "vmcore"), bounds); 937 else if (iscompressed && !isencrypted && !uncompress) 938 snprintf(corename, sizeof(corename), "vmcore.%d.%s", bounds, 939 (kdhl.compression == KERNELDUMP_COMP_GZIP) ? "gz" : "zst"); 940 else 941 snprintf(corename, sizeof(corename), "%s.%d", 942 istextdump ? "textdump.tar" : 943 (isencrypted ? "vmcore_encrypted" : "vmcore"), bounds); 944 fdcore = openat(savedirfd, corename, O_WRONLY | O_CREAT | O_TRUNC, 945 0600); 946 if (fdcore < 0) { 947 logmsg(LOG_ERR, "open(%s): %m", corename); 948 fclose(info); 949 nerr++; 950 goto closefd; 951 } 952 953 if (compress) 954 core = zdopen(fdcore, "w"); 955 else 956 core = fdopen(fdcore, "w"); 957 if (core == NULL) { 958 logmsg(LOG_ERR, "%s: %m", corename); 959 (void)close(fdcore); 960 (void)fclose(info); 961 nerr++; 962 goto closefd; 963 } 964 fdcore = -1; 965 966 xostyle = xo_get_style(NULL); 967 xoinfo = xo_create_to_file(info, xostyle, 0); 968 if (xoinfo == NULL) { 969 logmsg(LOG_ERR, "%s: %m", infoname); 970 fclose(info); 971 nerr++; 972 goto closeall; 973 } 974 xo_open_container_h(xoinfo, "crashdump"); 975 976 if (verbose) 977 printheader(xostdout, &kdhl, device, bounds, status); 978 979 printheader(xoinfo, &kdhl, device, bounds, status); 980 xo_close_container_h(xoinfo, "crashdump"); 981 xo_flush_h(xoinfo); 982 xo_finish_h(xoinfo); 983 fclose(info); 984 985 if (isencrypted) { 986 dumpkey = calloc(1, dumpkeysize); 987 if (dumpkey == NULL) { 988 logmsg(LOG_ERR, "Unable to allocate kernel dump key."); 989 nerr++; 990 goto closeall; 991 } 992 993 if (read(fddev, dumpkey, dumpkeysize) != (ssize_t)dumpkeysize) { 994 logmsg(LOG_ERR, "Unable to read kernel dump key: %m."); 995 nerr++; 996 goto closeall; 997 } 998 999 snprintf(keyname, sizeof(keyname), "key.%d", bounds); 1000 ret = writekey(savedirfd, keyname, dumpkey, dumpkeysize); 1001 explicit_bzero(dumpkey, dumpkeysize); 1002 if (!ret) { 1003 nerr++; 1004 goto closeall; 1005 } 1006 } 1007 1008 logmsg(LOG_NOTICE, "writing %s%score to %s/%s", 1009 isencrypted ? "encrypted " : "", compress ? "compressed " : "", 1010 savedir, corename); 1011 1012 if (istextdump) { 1013 if (DoTextdumpFile(fddev, dumplength, lasthd, buf, device, 1014 corename, core) < 0) 1015 goto closeall; 1016 } else { 1017 if (DoRegularFile(fddev, dumplength, sectorsize, 1018 !(compress || iscompressed || isencrypted), 1019 uncompress ? kdhl.compression : KERNELDUMP_COMP_NONE, 1020 buf, device, corename, core) < 0) { 1021 goto closeall; 1022 } 1023 } 1024 if (verbose) 1025 printf("\n"); 1026 1027 if (fclose(core) < 0) { 1028 logmsg(LOG_ERR, "error on %s: %m", corename); 1029 nerr++; 1030 goto closefd; 1031 } 1032 1033 symlinks_remove(savedirfd); 1034 if (symlinkat(infoname, savedirfd, "info.last") == -1) { 1035 logmsg(LOG_WARNING, "unable to create symlink %s/%s: %m", 1036 savedir, "info.last"); 1037 } 1038 if (isencrypted) { 1039 if (symlinkat(keyname, savedirfd, "key.last") == -1) { 1040 logmsg(LOG_WARNING, 1041 "unable to create symlink %s/%s: %m", savedir, 1042 "key.last"); 1043 } 1044 } 1045 if ((iscompressed && !uncompress) || compress) { 1046 snprintf(linkname, sizeof(linkname), "%s.last.%s", 1047 istextdump ? "textdump.tar" : 1048 (isencrypted ? "vmcore_encrypted" : "vmcore"), 1049 (kdhl.compression == KERNELDUMP_COMP_ZSTD) ? "zst" : "gz"); 1050 } else { 1051 snprintf(linkname, sizeof(linkname), "%s.last", 1052 istextdump ? "textdump.tar" : 1053 (isencrypted ? "vmcore_encrypted" : "vmcore")); 1054 } 1055 if (symlinkat(corename, savedirfd, linkname) == -1) { 1056 logmsg(LOG_WARNING, "unable to create symlink %s/%s: %m", 1057 savedir, linkname); 1058 } 1059 1060 nsaved++; 1061 1062 if (verbose) 1063 printf("dump saved\n"); 1064 1065 nuke: 1066 if (!keep) { 1067 if (verbose) 1068 printf("clearing dump header\n"); 1069 memcpy(kdhl.magic, KERNELDUMPMAGIC_CLEARED, sizeof(kdhl.magic)); 1070 memcpy(temp, &kdhl, sizeof(kdhl)); 1071 if (lseek(fddev, lasthd, SEEK_SET) != lasthd || 1072 write(fddev, temp, sectorsize) != (ssize_t)sectorsize) 1073 logmsg(LOG_ERR, 1074 "error while clearing the dump header: %m"); 1075 } 1076 xo_close_container_h(xostdout, "crashdump"); 1077 xo_finish_h(xostdout); 1078 free(dumpkey); 1079 free(temp); 1080 close(fddev); 1081 return; 1082 1083 closeall: 1084 fclose(core); 1085 1086 closefd: 1087 free(dumpkey); 1088 free(temp); 1089 close(fddev); 1090 } 1091 1092 /* Prepend "/dev/" to any arguments that don't already have it */ 1093 static char ** 1094 devify(int argc, char **argv) 1095 { 1096 char **devs; 1097 int i, l; 1098 1099 devs = malloc(argc * sizeof(*argv)); 1100 if (devs == NULL) { 1101 logmsg(LOG_ERR, "malloc(): %m"); 1102 exit(1); 1103 } 1104 for (i = 0; i < argc; i++) { 1105 if (strncmp(argv[i], _PATH_DEV, sizeof(_PATH_DEV) - 1) == 0) 1106 devs[i] = strdup(argv[i]); 1107 else { 1108 char *fullpath; 1109 1110 fullpath = malloc(PATH_MAX); 1111 if (fullpath == NULL) { 1112 logmsg(LOG_ERR, "malloc(): %m"); 1113 exit(1); 1114 } 1115 l = snprintf(fullpath, PATH_MAX, "%s%s", _PATH_DEV, 1116 argv[i]); 1117 if (l < 0) { 1118 logmsg(LOG_ERR, "snprintf(): %m"); 1119 exit(1); 1120 } else if (l >= PATH_MAX) { 1121 logmsg(LOG_ERR, "device name too long"); 1122 exit(1); 1123 } 1124 devs[i] = fullpath; 1125 } 1126 } 1127 return (devs); 1128 } 1129 1130 static char ** 1131 enum_dumpdevs(int *argcp) 1132 { 1133 struct fstab *fsp; 1134 char **argv; 1135 int argc, n; 1136 1137 /* 1138 * We cannot use getfsent(3) in capability mode, so we must 1139 * scan /etc/fstab and build up a list of candidate devices 1140 * before proceeding. 1141 */ 1142 argc = 0; 1143 n = 8; 1144 argv = malloc(n * sizeof(*argv)); 1145 if (argv == NULL) { 1146 logmsg(LOG_ERR, "malloc(): %m"); 1147 exit(1); 1148 } 1149 for (;;) { 1150 fsp = getfsent(); 1151 if (fsp == NULL) 1152 break; 1153 if (strcmp(fsp->fs_vfstype, "swap") != 0 && 1154 strcmp(fsp->fs_vfstype, "dump") != 0) 1155 continue; 1156 if (argc >= n) { 1157 n *= 2; 1158 argv = realloc(argv, n * sizeof(*argv)); 1159 if (argv == NULL) { 1160 logmsg(LOG_ERR, "realloc(): %m"); 1161 exit(1); 1162 } 1163 } 1164 argv[argc] = strdup(fsp->fs_spec); 1165 if (argv[argc] == NULL) { 1166 logmsg(LOG_ERR, "strdup(): %m"); 1167 exit(1); 1168 } 1169 argc++; 1170 } 1171 *argcp = argc; 1172 return (argv); 1173 } 1174 1175 static void 1176 init_caps(int argc, char **argv) 1177 { 1178 cap_rights_t rights; 1179 cap_channel_t *capcas; 1180 1181 capcas = cap_init(); 1182 if (capcas == NULL) { 1183 logmsg(LOG_ERR, "cap_init(): %m"); 1184 exit(1); 1185 } 1186 /* 1187 * The fileargs capability does not currently provide a way to limit 1188 * ioctls. 1189 */ 1190 (void)cap_rights_init(&rights, CAP_PREAD, CAP_WRITE, CAP_IOCTL); 1191 capfa = fileargs_init(argc, argv, checkfor || keep ? O_RDONLY : O_RDWR, 1192 0, &rights, FA_OPEN); 1193 if (capfa == NULL) { 1194 logmsg(LOG_ERR, "fileargs_init(): %m"); 1195 exit(1); 1196 } 1197 caph_cache_catpages(); 1198 caph_cache_tzdata(); 1199 if (caph_enter_casper() != 0) { 1200 logmsg(LOG_ERR, "caph_enter_casper(): %m"); 1201 exit(1); 1202 } 1203 capsyslog = cap_service_open(capcas, "system.syslog"); 1204 if (capsyslog == NULL) { 1205 logmsg(LOG_ERR, "cap_service_open(system.syslog): %m"); 1206 exit(1); 1207 } 1208 cap_close(capcas); 1209 } 1210 1211 static void 1212 usage(void) 1213 { 1214 xo_error("%s\n%s\n%s\n", 1215 "usage: savecore -c [-v] [device ...]", 1216 " savecore -C [-v] [device ...]", 1217 " savecore [-fkvz] [-m maxdumps] [directory [device ...]]"); 1218 exit(1); 1219 } 1220 1221 int 1222 main(int argc, char **argv) 1223 { 1224 cap_rights_t rights; 1225 const char *savedir; 1226 char **devs; 1227 int i, ch, error, savedirfd; 1228 1229 checkfor = compress = clear = force = keep = false; 1230 verbose = 0; 1231 nfound = nsaved = nerr = 0; 1232 savedir = "."; 1233 1234 openlog("savecore", LOG_PERROR, LOG_DAEMON); 1235 signal(SIGINFO, infohandler); 1236 1237 argc = xo_parse_args(argc, argv); 1238 if (argc < 0) 1239 exit(1); 1240 1241 while ((ch = getopt(argc, argv, "Ccfkm:uvz")) != -1) 1242 switch(ch) { 1243 case 'C': 1244 checkfor = true; 1245 break; 1246 case 'c': 1247 clear = true; 1248 break; 1249 case 'f': 1250 force = true; 1251 break; 1252 case 'k': 1253 keep = true; 1254 break; 1255 case 'm': 1256 maxdumps = atoi(optarg); 1257 if (maxdumps <= 0) { 1258 logmsg(LOG_ERR, "Invalid maxdump value"); 1259 exit(1); 1260 } 1261 break; 1262 case 'u': 1263 uncompress = true; 1264 break; 1265 case 'v': 1266 verbose++; 1267 break; 1268 case 'z': 1269 compress = true; 1270 break; 1271 case '?': 1272 default: 1273 usage(); 1274 } 1275 if (checkfor && (clear || force || keep)) 1276 usage(); 1277 if (clear && (compress || keep)) 1278 usage(); 1279 if (maxdumps > 0 && (checkfor || clear)) 1280 usage(); 1281 if (compress && uncompress) 1282 usage(); 1283 argc -= optind; 1284 argv += optind; 1285 if (argc >= 1 && !checkfor && !clear) { 1286 error = chdir(argv[0]); 1287 if (error) { 1288 logmsg(LOG_ERR, "chdir(%s): %m", argv[0]); 1289 exit(1); 1290 } 1291 savedir = argv[0]; 1292 argc--; 1293 argv++; 1294 } 1295 if (argc == 0) 1296 devs = enum_dumpdevs(&argc); 1297 else 1298 devs = devify(argc, argv); 1299 1300 savedirfd = open(savedir, O_RDONLY | O_DIRECTORY); 1301 if (savedirfd < 0) { 1302 logmsg(LOG_ERR, "open(%s): %m", savedir); 1303 exit(1); 1304 } 1305 (void)cap_rights_init(&rights, CAP_CREATE, CAP_FCNTL, CAP_FSTATAT, 1306 CAP_FSTATFS, CAP_PREAD, CAP_SYMLINKAT, CAP_FTRUNCATE, CAP_UNLINKAT, 1307 CAP_WRITE); 1308 if (caph_rights_limit(savedirfd, &rights) < 0) { 1309 logmsg(LOG_ERR, "cap_rights_limit(): %m"); 1310 exit(1); 1311 } 1312 1313 /* Enter capability mode. */ 1314 init_caps(argc, devs); 1315 1316 for (i = 0; i < argc; i++) 1317 DoFile(savedir, savedirfd, devs[i]); 1318 1319 /* Emit minimal output. */ 1320 if (nfound == 0) { 1321 if (checkfor) { 1322 if (verbose) 1323 printf("No dump exists\n"); 1324 exit(1); 1325 } 1326 if (verbose) 1327 logmsg(LOG_WARNING, "no dumps found"); 1328 } else if (nsaved == 0) { 1329 if (nerr != 0) { 1330 if (verbose) 1331 logmsg(LOG_WARNING, 1332 "unsaved dumps found but not saved"); 1333 exit(1); 1334 } else if (verbose) 1335 logmsg(LOG_WARNING, "no unsaved dumps found"); 1336 } 1337 1338 return (0); 1339 } 1340 1341 static void 1342 infohandler(int sig __unused) 1343 { 1344 got_siginfo = 1; 1345 } 1346